(navigation image)
Home Animation & Cartoons | Arts & Music | Community Video | Computers & Technology | Cultural & Academic Films | Ephemeral Films | Movies | News & Public Affairs | Prelinger Archives | Spirituality & Religion | Sports Videos | Television | Videogame Videos | Vlogs | Youth Media
Search: Advanced Search
Anonymous User (login or join us)
Upload

View movie

item imageitem imageitem imageitem image

View thumbnails

Play / Download (help[help])

(133.3 M)Ogg Video
(188.9 M)h.264
(372.3 M)QuickTime


All Files: HTTPS Torrent (2/0)
[Attribution-Share Alike 3.0]

Resources

Bookmark

Ariel SegallDay 2 Part 3: Introduction to Trusted Computing

something has gone horribly wrong 8-p
Prefer flash? · Embed · Questions/Feedback?

Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html
Follow us on Twitter for class news @OpenSecTraining.

This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context. You will also learn about how other technologies such as the Dynamic Root of Trust for Measurement (DRTM) and virtualization can both take advantage of TPMs and be used to enhance the TPM's capabilities.

We will cover major use cases for trusted computing, including machine authentication, data protection, and attestation. This course will also introduce you to the various software resources that exist today to support TPMs, give a high-level overview of related research and development projects, and briefly discuss other trusted computing standards such as Trusted Network Connect which may be relevant to enterprise deployment of TPMs and trusted computing.

Objectives:
* Introduce students to both basic and advanced TPM capabilities, as well as other trusted computing standards and technologies
* Show how TPMs and related technologies can be used in enterprise environments and for cutting-edge research
* Give students the necessary tools and information to design and build systems that take advantage of trusted computing


This movie is part of the collection: OpenSecurityTraining.info

Producer: Ariel Segall
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes

Creative Commons license: Attribution-Share Alike 3.0


Individual Files

Movie Files QuickTime h.264 Ogg Video
PR_IntroTC-D2P3.mov 372.3 MB 
188.9 MB 
133.3 MB 
Image Files Thumbnail Animated GIF
PR_IntroTC-D2P3.mov 5.1 KB 
335.9 KB 
Information FormatSize
Day2Part3IntroductionToTrustedComputing_files.xml Metadata [file] 
Day2Part3IntroductionToTrustedComputing_meta.xml Metadata 2.6 KB 
Other Files Archive BitTorrent
Day2Part3IntroductionToTrustedComputing_archive.torrent 29.2 KB 

Be the first to write a review
Downloaded 317 times
Reviews